[NEWS] Cisco Security Vulnerability in Aironet Telnet

From: support@securiteam.com
Date: 04/11/02


From: support@securiteam.com
To: list@securiteam.com
Date: Thu, 11 Apr 2002 07:49:59 +0200 (CEST)

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -

  Cisco Security Vulnerability in Aironet Telnet
------------------------------------------------------------------------

SUMMARY

It is possible to cause a denial-of-service attack if Cisco Aironet
products have Telnet access enabled. Telnet access is the only requirement
for such an attack; there are no additional conditions.

The workaround for this vulnerability is to disable Telnet access.

DETAILS

Affected Products:
All releases up to, but excluding, 11.21 are vulnerable. The following
hardware products are affected.

 * Cisco Aironet Access Point 340 and 350
 * Cisco Aironet Bridge 350

Products not affected are:
 * Cisco Aironet Bridge 340
 * Cisco Aironet 4800 Series
 * Cisco Aironet 4500 Series and 3500 Series
 * Cisco Aironet 3100 Series

No other Cisco products are affected.

Details:
This vulnerability is documented as Cisco Bug ID CSCdw81244.

It is possible to cause Cisco Aironet products to reboot if Telnet access
is enabled and a password is required for authorization. This can be
accomplished by providing an invalid username and password. This
vulnerability cannot be triggered via the web interface.

Impact:
By repeatedly exploiting this vulnerability an attacker can cause denial
of service.

Software Versions and Fixes:
This vulnerability is fixed in release 11.21, which is available now.

Obtaining Fixed Software:
Cisco is offering free software upgrades to remedy this vulnerability for
all affected customers. Customers may only install and expect support for
the feature sets they have purchased.

Customers with service contracts should obtain upgraded software through
their regular update channels to any software release containing the
feature sets they have purchased. For most customers, this means that
upgrades should be obtained through the Software Center on Cisco's
worldwide website at <http://www.cisco.com> http://www.cisco.com.

Customers whose Cisco products are provided or maintained through prior or
existing agreement with third-party support organizations such as Cisco
Partners, authorized resellers, or service providers should contact that
support organization for assistance with the upgrade, which should be free
of charge.

Customers who purchased directly from Cisco but who do not hold a Cisco
service contract, and customers who purchase through third-party vendors
but are unsuccessful at obtaining fixed software through their point of
sale, should obtain fixed software by contacting the Cisco Technical
Assistance Center (TAC).

Cisco TAC contacts are as follows:
 * +1 800 553 2447 (toll-free from within North America)
 * +1 408 526 7209 (toll call from anywhere in the world)
 * e-mail: tac@cisco.com

See <http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml>
http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for additional
TAC contact information, including special localized telephone numbers and
instructions and e-mail addresses for use in various languages.

Please have your product serial number available and give the URL of this
notice as evidence of your entitlement to a free upgrade. Free upgrades
for non-contract customers must be requested through the TAC.

Please do not contact either "psirt@cisco.com" or
"security-alert@cisco.com" for software upgrades.

Workarounds:
The workaround is to disable Telnet access. You can accomplish this by
following the link, via the web interface, path to reach the
Console/Telnet Setup page:
1) On the Summary Status page, click Setup.
2) On the Setup page, click Console/Telnet in the Services section of the
page.
3) On that page, click on the radio button for Disable Telnet.

Note: You must use the web interface or be connected on the console since
you will be unable to save your changes if you are using Telnet. After
disabling Telnet, your Telnet session will be terminated.

ADDITIONAL INFORMATION

The information has been provided by <mailto:psirt@cisco.com> Cisco
Systems Product Security Incident Response Team.

========================================

This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [NEWS] Denial-of-Service of TCP-based Services in CatOS
    ... Beyond Security in Canada ... No other Cisco products are affected. ... Cisco is offering free software upgrades to address these vulnerabilities ... Customers may only install and expect support ...
    (Securiteam)
  • [NEWS] ATA-186 Password Disclosure Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... The Cisco ATA 186 Analog Telephone Adaptor is a handset-to-Ethernet ... all affected customers. ... notice as evidence of your entitlement to a free upgrade. ...
    (Securiteam)
  • [NEWS] Microsoft SQL Server 2000 Vulnerabilities in Cisco Products
    ... Beyond Security would like to welcome Tiscali World Online ... These vulnerabilities were discovered and publicly announced ... All Cisco products and applications that are using unpatched Microsoft SQL ... Customers running version 3.3should install Cisco's cumulative SQL ...
    (Securiteam)
  • [NT] Cisco Secure ACS Web Server Found to Contain Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... vulnerabilities. ... Cisco Secure ACS for UNIX is not vulnerable. ... all affected customers. ...
    (Securiteam)
  • [NEWS] Cisco Products found to Contain zlib Compression Library Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... There is a vulnerability in the zlib compression library. ... While we have not identified any Cisco ... Customers are strongly advised to migrate to a recent product. ...
    (Securiteam)